Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2
From MaRDI portal
Publication:2056728
Recommendations
- Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2
- scientific article; zbMATH DE number 1759258
- A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
- Advances in Cryptology - CRYPTO 2003
- Instant ciphertext-only cryptanalysis of GSM encrypted communication
Cites work
- scientific article; zbMATH DE number 5862915 (Why is no real title available?)
- scientific article; zbMATH DE number 3910296 (Why is no real title available?)
- scientific article; zbMATH DE number 854547 (Why is no real title available?)
- A $T = O(2^{n/2} )$, $S = O(2^{n/4} )$ Algorithm for Certain NP-Complete Problems
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- A family of difference sets in non-cyclic groups
- Advances in Cryptology - CRYPTO 2003
- Algebraic coding theory
- Cryptanalysis of Luffa v2 components
- Cryptanalysis of the FLIP family of stream ciphers
- Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\)
- Hybrid approach for solving multivariate systems over finite fields
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
- On ``bent functions
- Rebound distinguishers: results on the full Whirlpool compression function
- Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12--13, 2010. Revised selected papers
- Shift-register synthesis and BCH decoding
Cited in
(9)- A low data complexity attack on the GMR-2 cipher used in the satellite phones
- Automated meet-in-the-middle attack goes to Feistel
- Meet-in-the-middle preimage attacks on sponge-based hashing
- Falling into bytes and pieces -- cryptanalysis of an Apple patent application
- Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2
- Frequency characteristics of sequences generated by the stream encryption algorithm GEA-1
- \texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits
- Time-memory trade-offs sound the death knell for GPRS and GSM
- Constructing and deconstructing intentional weaknesses in symmetric ciphers
This page was built for publication: Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2056728)